netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Pablo Neira Ayuso <pablo@netfilter.org>
To: "Vitaly E. Lavrov" <lve@guap.ru>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: xt_recent BUG() in kernel 3.2/3.4  & patch
Date: Tue, 11 Dec 2012 02:20:17 +0100	[thread overview]
Message-ID: <20121211012017.GA15044@1984> (raw)
In-Reply-To: <50C4730D.2080401@guap.ru>

[-- Attachment #1: Type: text/plain, Size: 2857 bytes --]

On Sun, Dec 09, 2012 at 03:16:29PM +0400, Vitaly E. Lavrov wrote:
> Appears when stopping container without emptying tables (iptables
> -F/iptables -t mangle -F)
> 
> Problem: recent_mt_destroy called after __net_exit recent_net_exit() !
> 
> xt_hashlimit contains a BUG () and should be corrected similarly

I'll be really happy if we find a way to reverse the order of those
calls, so we don't need to hack xt_recent and xt_hashlimit.

Could you test this patch?

Thanks.

> Possible patch for xt_recent is below
> =============
> diff --git a/net/netfilter/xt_recent.c b/net/netfilter/xt_recent.c
> index d2ff15a..0fc5c32 100644
> --- a/net/netfilter/xt_recent.c
> +++ b/net/netfilter/xt_recent.c
> @@ -75,6 +75,9 @@ struct recent_entry {
>  struct recent_table {
>         struct list_head        list;
>         char                    name[XT_RECENT_NAME_LEN];
> +#ifdef CONFIG_PROC_FS
> +       struct proc_dir_entry   *pe;
> +#endif
>         unsigned int            refcnt;
>         unsigned int            entries;
>         struct list_head        lru_list;
> @@ -375,6 +378,7 @@ static int recent_mt_check(const struct
> xt_mtchk_param *par)
>         }
>         pde->uid = ip_list_uid;
>         pde->gid = ip_list_gid;
> +       t->pe = pde;
>  #endif
>         spin_lock_bh(&recent_lock);
>         list_add_tail(&t->list, &recent_net->tables);
> @@ -398,7 +402,8 @@ static void recent_mt_destroy(const struct
> xt_mtdtor_param *par)
>                 list_del(&t->list);
>                 spin_unlock_bh(&recent_lock);
>  #ifdef CONFIG_PROC_FS
> -               remove_proc_entry(t->name, recent_net->xt_recent);
> +               if(t->pe)
> +                       remove_proc_entry(t->name, recent_net->xt_recent);
>  #endif
>                 recent_table_flush(t);
>                 kfree(t);
> @@ -607,7 +612,19 @@ static void __net_exit recent_net_exit(struct net *net)
>  {
>         struct recent_net *recent_net = recent_pernet(net);
> 
> -       BUG_ON(!list_empty(&recent_net->tables));
> +       if(!list_empty(&recent_net->tables)) {
> +#ifdef CONFIG_PROC_FS
> +               struct recent_table *t;
> +               spin_lock_bh(&recent_lock);
> +               list_for_each_entry(t, &recent_net->tables, list) {
> +                       t->pe = NULL;
> +                       remove_proc_entry(t->name, recent_net->xt_recent);
> +               }
> +               spin_unlock_bh(&recent_lock);
> +#endif
> +               printk(KERN_INFO "%s net %x: Warning! Tables not empty!\n",
> +                               __func__,(u32)net);
> +       }
>         recent_proc_net_exit(net);
>  }
> ==================
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

[-- Attachment #2: x --]
[-- Type: text/plain, Size: 1152 bytes --]

diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c
index 17c5e06..532ae92 100644
--- a/net/ipv4/netfilter/ip_tables.c
+++ b/net/ipv4/netfilter/ip_tables.c
@@ -2266,5 +2266,5 @@ static void __exit ip_tables_fini(void)
 EXPORT_SYMBOL(ipt_register_table);
 EXPORT_SYMBOL(ipt_unregister_table);
 EXPORT_SYMBOL(ipt_do_table);
-module_init(ip_tables_init);
+core_initcall(ip_tables_init);
 module_exit(ip_tables_fini);
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c
index 125a90d..5dc3c7e 100644
--- a/net/ipv6/netfilter/ip6_tables.c
+++ b/net/ipv6/netfilter/ip6_tables.c
@@ -2275,5 +2275,5 @@ EXPORT_SYMBOL(ip6t_register_table);
 EXPORT_SYMBOL(ip6t_unregister_table);
 EXPORT_SYMBOL(ip6t_do_table);
 
-module_init(ip6_tables_init);
+core_initcall(ip6_tables_init);
 module_exit(ip6_tables_fini);
diff --git a/net/netfilter/x_tables.c b/net/netfilter/x_tables.c
index 8d987c3..afcea11 100644
--- a/net/netfilter/x_tables.c
+++ b/net/netfilter/x_tables.c
@@ -1390,6 +1390,6 @@ static void __exit xt_fini(void)
 	kfree(xt);
 }
 
-module_init(xt_init);
+core_initcall(xt_init);
 module_exit(xt_fini);
 

      reply	other threads:[~2012-12-11  1:20 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-12-09 11:16 xt_recent BUG() in kernel 3.2/3.4 & patch Vitaly E. Lavrov
2012-12-11  1:20 ` Pablo Neira Ayuso [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121211012017.GA15044@1984 \
    --to=pablo@netfilter.org \
    --cc=lve@guap.ru \
    --cc=netfilter-devel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).